Month: August 2014

As you know hackers are anonymous, That’s why they are very famous, They do what they like, So,they can hack facebook,twitter an hike, Don’t give challenge to hacker, They are more dangerous than crackers, Hacker steals the information , Cracks the password without your permission, Those who loves the hacker, Can join Read more about WORK OF HACKER[…]

Hackers took technology at an extreme height, But some are black and rest are white, White hat hackers have always right thinking, But black hat have always feeling of embarrassing, Some hack for fun, some for duty, white hat hacker is the medium to spread the hacking beauty, Hacker are like a mirrror, who Read more about Who is hacker[…]

Hacking with Kali introduces you the most current distribution of the de fact standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure Read more about Hacking with Kali: Practical Penetration Testing Techniques[…]

Today topic is footprinting, How its working now we are talking, Network,website,server all these r parts of footprinting, & not 2 forget the information gathering & social engineering, Footprinting is just to trace the victims, & let the target permanently grim, First part of hacking is information gathering, To know the password & username like Read more about FOOTPRINTING ★[…]